Sciweavers

1140 search results - page 160 / 228
» A Purpose-Based Access Control Model
Sort
View
CORR
2010
Springer
83views Education» more  CORR 2010»
13 years 8 months ago
Utility Constrained Energy Minimization In Aloha Networks
In this paper we consider the issue of energy efficiency in random access networks and show that optimizing transmission probabilities of nodes can enhance network performance in t...
Amir Mahdi Khodaian, Babak Hossein Khalaj, Mohamma...
USS
2008
13 years 10 months ago
Verifying Compliance of Trusted Programs
In this paper, we present an approach for verifying that trusted programs correctly enforce system security goals when deployed. A trusted program is trusted to only perform safe ...
Sandra Rueda, Dave King 0002, Trent Jaeger
DIM
2005
ACM
13 years 9 months ago
A delegation framework for federated identity management
Identity federation is a powerful scheme that links accounts of users maintained distinctly by different business partners. The concept of network identity is a driver for accele...
Hidehito Gomi, Makoto Hatakeyama, Shigeru Hosono, ...
VLDB
2007
ACM
225views Database» more  VLDB 2007»
14 years 8 months ago
An Approach to Optimize Data Processing in Business Processes
In order to optimize their revenues and profits, an increasing number of businesses organize their business activities in terms of business processes. Typically, they automate imp...
Marko Vrhovnik, Holger Schwarz, Oliver Suhre, Bern...
QSHINE
2005
IEEE
14 years 1 months ago
Enhancing the IEEE 802.11e in QoS Support: Analysis and Mechanisms
Despite its support of prioritized services, the IEEE 802.11e Enhanced Distributed Channel Access (EDCA) cannot guarantee strict QoS required by real-time services such as voice a...
Xiang Chen, Hongqiang Zhai, Yuguang Fang